Warfarin dosing is challenging due to a multitude of factors affecting its pharmacokinetics (PK) and pharmacodynamics (PD). A novel personalised dosing algorithm predicated on a warfarin PK/PD model and incorporating CYP2C9 and VKORC1 genotype information has been developed for children. The present prospective, observational study aimed to compare the model with conventional weight-based dosing. The study involved two groups of children post-cardiac surgery: Group 1 were warfarin naïve, in whom loading and maintenance doses were estimated using the model over a 6-month duration and compared to historical case-matched controls. Group 2 were already established on maintenance therapy a
Background: Thyroid operation needs very meticulous haemostasis to have minimal morbidity and mortality.
Objectives: Assessment of harmonic knife in open thyroid surgery as anew haemostatic procedure .
Type of the study: Cross-sectional study.
Methods: This study had been conducted at Alkindy teaching hospital in Baghdad city from the 1st of May 2013 to the 1st of January 2017 on 229 goiterous patients who needs thyroidectomy(36 males,193 females),divided in 2 groups according to the haemostatic procedure used during their operations, Group A (15 males,85females)using the usual conventional surgery(
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreCloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThispaperpresentsthesynthesisandstudyofsomenewmixed-liagnd complexescontainingtowaminoacids[Alanine(Ala)andphenylalanine(phe)]withsome metals .Theresultsproductswerefoundtobesolidcrystallinecomplexeswhichhave been characterized by using (FT-IR,UV-Vis) spectra , melting point, elemental analysis (C.H.N) , molar conductivity and solubiltyThe proposed structure of the complexes using program , chem office 3D(2000) .The general formula have been given for the prepared complexes :[M(A-H)(phe-H)]M(II): Hg , Mn ,Co , Ni , Cu ) , Zn , Cd(II) .Ala = Alanine acid = C3H7NO2Phe = phenylalanine = C9H11NO2
1-(4-amino-3-(benzo[d]thiazol-2-yldiazenyl)phenyl)ethanone has been synthezied by reaction the diazonium salt of 2-aminobenzothiazole with 4-aminoacetophenone. Specroscopic studies ( FTIR,UV-Vis, 1H and 13CNMR) and microelemental analysis (C.H.N.S.O) are use to identified of the azo ligand. Metal chelates of some transition metals were performed as well depicted. Complexes were identified using atomic absorption of flame, elemental analysis, infrared and UV-Vis spectral process as well conductivity and magnetic quantifications. Nature of compounds produced have been studied followed the mole ratio and continuous contrast methods, Beer's law followed during a concentration scope (1×10-4 - 3×10-4 mol/L). height molar absorbtivity of compoun
... Show MoreDiazotization reaction between 1-(2,4,6-Trihydroxy-phenyl)-ethanone and diazonium salts was carried out resulting in ligand 4-(3-Acetyl-2,4,6-trihydroxy-phenylazo)-N-(5-methyl-isoxazol-3-yl)-benzenesulfonamide, this in turn reacted with the next metal ions (V4+ , Cr3+ , Mn2+ and Cu2+) forming stable complexes with unique geometries such as (Octahedral for both Cr3+ , Mn2+ and Cu2+ ,squar pyramidal for V4+). The creation of such complexes was detected by employing spectroscopic means involving ultraviolet-visible which proved the obtained geometries, fourier transfer proved the formation of azo group and and the coordination with metal ion through it. Pyrolysis (TGA & DSC) studies proved the coordination of water residues with me
... Show More